Tips to Avoid the Mortal Sins That Undermine Network Security

Join network security experts Eric Hanselman, Research Director at 451 Research, and Dr. Mike Lloyd, CTO at RedSeal, for this fact-filled webcast where they’ll share their list of the most egregious errors found in network security management, based on hands-on analysis and observation of some of the most complex network environments in the world.

This session will include details on how and why these painful mistakes manifest themselves, and tips on what you can do to prevent them, followed by open Q&A.

Tom Bowers, vCISO for ePlus and their clients, will cover what he sees as the looming threats for 2016, including Threat Intelligence and Sharing, State Sponsored Code and Commercial Malware, Security of Big Data, Embedded Systems, and the Physical and Cyber Convergence.

Customer data is complicated. It lives everywhere and changes frequently. Creating a holistic view of the customer journey can be a challenge, even as the opportunities are obvious. Join Larry Drebes, Founder and CEO of Janrain for lessons learned from thousands of enterprises, challenges with different approaches to customer data management, and the benefits of managing customer identity in the cloud.

Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.

Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.

Operating from the belief that education is the most powerful weapon, one of our foremost security researchers will provide an analysis on a recently documented stealthy malware family named Stegoloader. Our upcoming webcast will unveil the sophistication of Stegoloader’s characteristics which make it hard to analyze and detect. This webcast will help you understand the nature of Stegoloader in order to counter it more efficiently and effectively.

Pierre-Marc Bureau, Senior Security Researcher from the Counter Threat Unit (CTU), will discuss how Stegoloader cloaks its main component as a harmless Portable Network Image (PNG) while it extracts and executes malicious code hidden within an image. Although CTU researchers have not observed Stegoloader being used in targeted attacks, it has significant information stealing capabilities. Malware authors are constantly looking for ways to adapt and improve detection mechanisms, which makes Stegoloader a prime candidate for cyber-criminals arsenals. Learn how digital steganography may be a new trend for threat actors globally.

In this webcast, you will:

- Gain insight on when and where Stegoloader was first encountered.
- Learn characteristics of Stegoloader and how it operates.
- Understand digital steganography trends and how to detect and remediate.

A seemingly never-ending string of large scale data breaches across all sectors of the economy and government have had devastating affects on countless individuals — and irreparably damaged organizations of all kinds. It’s been proven that privileged users, and the accounts and credentials they use, are a crucial element in conducting a successful attack. But it’s possible to protect those users and stop data breaches in their tracks.

In this webcast, we’ll explain how Xsuite and privileged identity management can stop attackers at multiple points in the data breach lifecycle, preventing damage and disruption. Join us to learn:

- Who are privileged users and why are they important?
- How do attackers exploit privileged users and their credentials to carry out breaches?
- See a hands-on demonstration of Xsuite and how it can manage, control, and protect privileged users and credentials and your business assets.

Register now to join us live at 1:00 pm ET Thursday, July 30, 2015 or on demand afterwards.

The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.

The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.

Financial institutions spend billions of dollars on firewalls, proxies, routers and other devices to prevent unauthorized access to their network, but security breaches continue to plague the industry.

While faced with a barrage of attacks, CISOs are dealing with increasingly complex networks due to the cumulative demands of users as well as connectivity requirements, business operations and regulatory compliance mandates. As a result of this increased complexity, financial organizations' IT resources are struggling to meet today's required security standards.

Most large enterprises identify thousands of vulnerabilities every time they conduct a vulnerability assessment. But scanning for vulnerabilities is only the first step—figuring out which vulnerabilities truly matter is the subsequent challenge.

• Is critical financial information at risk because a vulnerability is exposed to the Internet or extranet?
• Has a vulnerability already been effectively mitigated with network-level controls?
• Do vulnerabilities in minor systems allow a hacker to leapfrog to more critical systems?

Join McAfee and RedSeal for an informative webcast to learn why prioritizing remediation efforts according to risk is essential to effective vulnerability management and how the RedSeal Vulnerability Advisor software integrates and analyzes the vulnerability information collected by McAfee’s Vulnerability Manager to give organizations true insight into their vulnerability risk.

The “Jumpstart to RedSeal” demo provides you with a 20 minute overview of the company, what the product does, customer challenges, and how the RedSeal 5 Platform can address them. The highlight - a 15 minute demonstration of the RedSeal UI and reporting features - details how networks can improve their attack defenses, prioritize vulnerabilities based on exposure, evaluate for compliance, and enhance firewall change management processes.

A Wall Street & Technology Webcast: With cyber espionage currently responsible for $13 billion in losses to the U.S. economy, according to the FBI, finding ways to predict and prevent future cyber attacks is vital for businesses. On Wall Street, as the number of devices on enterprise networks continues to grow, cyber espionage perpetrators are capitalizing on the increased complexity of network access to compromise critical data assets. A proactive approach that includes predictive security using visualized network modeling can help you identify access pathways and the associated vulnerabilities and quickly pinpoint the specific systems and devices most susceptible to attack.

The “Jumpstart to RedSeal” demo provides you with a 20 minute overview of the company, what the product does, customer challenges, and how the RedSeal 5 Platform can address them. The highlight - a 15 minute demonstration of the RedSeal UI and reporting features - details how networks can improve their attack defenses, prioritize vulnerabilities based on exposure, evaluate for compliance, and enhance firewall change management processes.

The “Jumpstart to RedSeal” demo provides you with a 20 minute overview of the company, what the product does, customer challenges, and how the RedSeal 5 Platform can address them. The highlight - a 15 minute demonstration of the RedSeal UI and reporting features - details how networks can improve their attack defenses, prioritize vulnerabilities based on exposure, evaluate for compliance, and enhance firewall change management.

Join network security experts Eric Hanselman, Research Director at 451 Research, and Dr. Mike Lloyd, CTO at RedSeal, for this fact-filled webcast where they’ll share their list of the most egregious errors found in network security management, based on hands-on analysis and observation of some of the most complex network environments in the world.

This session will include details on how and why these painful mistakes manifest themselves, and tips on what you can do to prevent them, followed by open Q&A.

Security metrics for improving management have long been an issue of discussion and debate across the industry. Some experts and practitioners contend that we need these key indicators if we’re ever going to drive down real-world risk, while others think that the concept can’t be applied practically. Some experts feel that we just haven’t found the right numbers to measure security effectiveness yet.

Count RedSeal Networks among the final group… although we think that we’ve made some important headway in helping organizations unearth those figures that will actually allow them to better trend and improve their rates of success.

Expanding on his sold-out keynote at Security BSidesSD, join RedSeal CTO Dr. Mike Lloyd for a webcast: Security Metrics that Matter
As part of his presentation Dr. Mike will outline:

Every organization wants to know the answer but few have even attempted to quantify it: What's my ROI, or return, on IT security?

Until now.

Using its proprietary (yet public) methodology, research and best practices specialists IANS has begun helping CSOs and other security officials deduce and measure precisely what they're getting in exchange for all the money they spend. In late 2011, IANS conducted such a study on automotive market experts Polk, specifically related to the company's use of RedSeal solutions.

Please join us for this highly informative webcast during which IANS Faculty Member and industry analyst Diana Kelley outlines the ROS process and guidelines, and then hosts a discussion with Ethan Steiger, Chief Security Officer, Polk about his experiences and milestones using RedSeal. Joining the call will be RedSeal CTO Dr. Mike Lloyd, to provide color commentary and yes, that cool, smart-sounding foreign accent.

In addition to a general overview of the Polk use case, hear more about how the company leveraged RedSeal's proactive security intelligence solution to save time and money, lower real-world risk, automate and simplify regulatory compliance, and garner an ROI figure ofÂ¦ yes, $30 million!

How did IANS arrive at such a massive number? Let's face it, you can spend a lot of money responding to a breach. Though, while that's true, it's truly just a small piece of the larger story.

Security is inherently intangible, so answering questions such as "Is my network secure?” are considerably complex. The ultimate goal is the absence of a breach – how do you measure and show improvement to your internal and external audience?

The traditional approach has been to measure activity – all of the processes that can be recorded: How many times did you change the firewall? How many patches did you deploy? How many times did you update your antivirus signatures? While collecting this data may pacify the auditors, the problem is that you’re measuring busyness, not your business.

In this webinar featuring Securosis analyst and president Mike Rothman, we will explore:
•Today’s security metrics – what most organizations are collecting today vs actionable and useable metrics for decision support
•What and how to communicate network security metrics – internal vs external audiences
•Practical measurement of risk – technology to assess how well your work is preventing problems

Enterprise organizations and government agencies have spent countless years and millions of dollars attempting to segment infrastructure and protect critical assets, but most have no idea how well layered defenses actually work.

Security, networking and audit staff have no centralized means of visualizing the state of protection or current attack surface, end-to-end, or communicating that intelligence.

Management cannot determine the ROI of security spend; risk is prioritized using static ranking; circumvention of simple controls still enables most breaches.

Enter RedSeal Networks, the only provider of proactive security management solutions that offer a continuous method of assessing IT protection and risk exposure. Pinpoint the precise level of access permitted across security infrastructure, informed by the business value of underlying host assets and data. Prioritize risk, validate compliance and manage security using quantitative analysis.